{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "description", "text": "Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack.", "title": "Vulnerability Description" } ], "publisher": { "category": "other", "contact_details": "gdt@cpan.org", "name": "giterlizzi", "namespace": "https://github.com/giterlizzi/" }, "references": [ { "category": "self", "summary": "CPANSA-File-Path-2004-0452 JSON", "url": "https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2004/cpansa-file-path-2004-0452.json" }, { "category": "external", "summary": "http://www.debian.org/security/2004/dsa-620", "url": "http://www.debian.org/security/2004/dsa-620" }, { "category": "external", "summary": "http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml", "url": "http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml" }, { "category": "external", "summary": "http://www.redhat.com/support/errata/RHSA-2005-103.html", "url": "http://www.redhat.com/support/errata/RHSA-2005-103.html" }, { "category": "external", "summary": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U" }, { "category": "external", "summary": "http://www.securityfocus.com/bid/12072", "url": "http://www.securityfocus.com/bid/12072" }, { "category": "external", "summary": "http://secunia.com/advisories/12991", "url": "http://secunia.com/advisories/12991" }, { "category": "external", "summary": "http://secunia.com/advisories/18517", "url": "http://secunia.com/advisories/18517" }, { "category": "external", "summary": "http://fedoranews.org/updates/FEDORA--.shtml", "url": "http://fedoranews.org/updates/FEDORA--.shtml" }, { "category": "external", "summary": "http://www.redhat.com/support/errata/RHSA-2005-105.html", "url": "http://www.redhat.com/support/errata/RHSA-2005-105.html" }, { "category": "external", "summary": "http://secunia.com/advisories/55314", "url": "http://secunia.com/advisories/55314" }, { "category": "external", "summary": "http://marc.info/?l=bugtraq&m=110547693019788&w=2", "url": "http://marc.info/?l=bugtraq&m=110547693019788&w=2" }, { "category": "external", "summary": "https://www.ubuntu.com/usn/usn-44-1/", "url": "https://www.ubuntu.com/usn/usn-44-1/" }, { "category": "external", "summary": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18650", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18650" }, { "category": "external", "summary": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9938", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9938" }, { "category": "external", "summary": "CVE-2004-0452 (NVD)", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0452" } ], "title": "File-Path vulnerability", "tracking": { "current_release_date": "2004-12-21T00:00:00", "generator": { "engine": { "name": "CSAF Perl Toolkit", "version": "0.26" } }, "id": "CPANSA-File-Path-2004-0452", "initial_release_date": "2004-12-21T00:00:00", "revision_history": [ { "date": "2004-12-21T00:00:00", "number": "1", "summary": "First release" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:cpan/>=1.06|<=1.404", "product": { "name": "File-Path greater than or equal 1.06 and less than or equal 1.404", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "File-Path" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0452", "notes": [ { "category": "description", "text": "Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack.", "title": "Vulnerability Description" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "scores": [ { "cvss_v2": { "baseScore": 2.6, "vectorString": "AV:L/AC:H/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }